NCJ Number
226214
Journal
Law Enforcement Technology Volume: 36 Issue: 2 Dated: February 2009 Pages: 20,22,25
Date Published
February 2009
Length
5 pages
Annotation
This article discusses how information technology systems within the law enforcement community are safeguarding sensitive data with the adoption of new solutions and new standards of security.
Abstract
If a breach is detected in government data, in addition to notifying people, in some areas, punitive damage monies may be allowable under law for the leaked data. Factoring in the many essential mobile workstations in patrol vehicles as well as laptop units that cannot be kept behind constant lock and key, how can management protect data without limiting its utility? Law enforcement information technology (IT) administrators continue to find ways to integrate policy and technology to protect data without limiting useful access. This article briefly describes ways in which IT administrators from several law enforcement agencies have adopted solutions to protect government-hosted information, such as Canada’s smartcard-based e Token and South Carolina’s McAfee’s Endpoint Encryption.